Analysis
-
max time kernel
2s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08e71bab9a4920e52e34d7fe47e9a21c.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
08e71bab9a4920e52e34d7fe47e9a21c.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
08e71bab9a4920e52e34d7fe47e9a21c.exe
-
Size
385KB
-
MD5
08e71bab9a4920e52e34d7fe47e9a21c
-
SHA1
76c8e8e418ee8e08487fd255afba0ac3c86b5930
-
SHA256
4baa4d087baccee6f891cb86af368f400bc64c17dc3e70349879d009c2020231
-
SHA512
058f51b765260b419ec8c9cc7299b9bc0378b141510f25a174d7fced1a6857a49d8ee66b60c86392ea759b328b5c757979d17355975403d5a839c0de09dd8a02
-
SSDEEP
6144:2cCupSr5KY42x3keYbrqCrrzFyZvgmdnZb8j3A0yKnPgvjzWNq77XkEB:JCupSrsYDx3Fwrz+TvsAxKezWN07XPB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 08e71bab9a4920e52e34d7fe47e9a21c.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 08e71bab9a4920e52e34d7fe47e9a21c.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe 3044 08e71bab9a4920e52e34d7fe47e9a21c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3044 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe 17 PID 2940 wrote to memory of 3044 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe 17 PID 2940 wrote to memory of 3044 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe 17 PID 2940 wrote to memory of 3044 2940 08e71bab9a4920e52e34d7fe47e9a21c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e71bab9a4920e52e34d7fe47e9a21c.exe"C:\Users\Admin\AppData\Local\Temp\08e71bab9a4920e52e34d7fe47e9a21c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\08e71bab9a4920e52e34d7fe47e9a21c.exeC:\Users\Admin\AppData\Local\Temp\08e71bab9a4920e52e34d7fe47e9a21c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3044
-